30th week of 2015 patent applcation highlights part 45 |
Patent application number | Title | Published |
20150205955 | METHOD, DEVICE, AND SYSTEM OF DIFFERENTIATING AMONG USERS BASED ON RESPONSES TO INJECTED INTERFERENCES - Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a cyber-attacker. An end-user device (a desktop computer, a laptop computer, a smartphone, a tablet, or the like) interacts and communicates with a server of a computerized server (a banking website, an electronic commerce website, or the like). The interactions are monitored, tracked and logged. User Interface (UI) interferences or irregularities are intentionally introduced to the communication session; and the server tracks the response or the reaction of the end-user to such communication interferences. The system determines whether the user is a legitimate human user, or a cyber-attacker or automated script posing as the legitimate human user. The system further detects click-fraud, and prevents or mitigates Application Distributed Denial-of-Service attacks. | 2015-07-23 |
20150205956 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - A progress status of an attack on an information system possibly carried out is visualized to display a warning to a user, without using a correlation rule. A table storage stores a past case table indicating a phase string obtained by concatenating phase values indicating attack progress degrees according to an event occurrence pattern in a past case. A phase string generator obtains a phase string by concatenating phase values according to the occurrence pattern of events that have occurred in the information system. A similarity degree calculator calculates a similarity degree between the obtained phase string and the phase string indicated in the past case table. An attack status visualization unit visualizes the progress status of the attack on the information system, based on the obtained phase string and a result of calculation of the similarity degree by the similarity degree calculator. | 2015-07-23 |
20150205957 | METHOD, DEVICE, AND SYSTEM OF DIFFERENTIATING BETWEEN A LEGITIMATE USER AND A CYBER-ATTACKER - Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a cyber-attacker. An end-user device (a desktop computer, a laptop computer, a smartphone, a tablet, or the like) interacts and communicates with a server of a computerized server (a banking website, an electronic commerce website, or the like). The interactions are monitored, tracked and logged. User Interface (UI) interferences are intentionally introduced to the communication session; and the server tracks the response or the reaction of the end-user to such communication interferences. The system determines whether the user is a legitimate human user, or a cyber-attacker posing as the legitimate human user. | 2015-07-23 |
20150205958 | METHOD, DEVICE, AND SYSTEM OF DIFFERENTIATING AMONG USERS BASED ON USER CLASSIFICATION - Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a cyber-attacker. An end-user device interacts and communicates with a server of a computerized server (a banking website, an electronic commerce website, or the like). The interactions are monitored, tracked and logged. User Interface (UI) interferences or irregularities are introduced; and the server tracks the response or the reaction of the end-user to such interferences. The system determines whether the user is a legitimate user, or a cyber-attacker or automated script posing as the legitimate user. The system utilizes classification of users into classes or groups, to deduce or predict how a group-member would behave when accessing the service through a different type of device. The system identifies user-specific traits that are platform-independent and thus can be further monitored when the user switches from a first platform to a second platform. | 2015-07-23 |
20150205959 | METHOD AND APPARATUS FOR RETROACTIVELY DETECTING MALICIOUS OR OTHERWISE UNDESIRABLE SOFTWARE - A system retroactively detects malicious software on an end user system without performing expensive cross-referencing directly on the endpoint device. A client provides a server with information about files that are on it together with what it knows about these files. The server tracks this information and cross-references it against new intelligence it gathers on clean or malicious files. If a discrepancy in found (i.e., a file that had been called malicious, but that is actually benign or vice versa), the server informs the client, which in turn takes an appropriate action based on this information. | 2015-07-23 |
20150205960 | METHOD OF DETECTING A MALWARE BASED ON A WHITE LIST - A method of detecting a malware based on a white list comprises: receiving on a server side a program feature and/or a program behavior of a program to be detected sent from a client side; comparing the program feature and/or the program behavior of the detected program with legitimate program features and/or legitimate program behaviors stored in a white list; obtaining a legitimacy information of the unknown program based on the comparison result and feeding this back to the client side. In the invention, a legitimate program is determined by using a white list, thereby determining an illegitimate program excluded from the white list as a malware, which performs a determination and detecting and removing of a malware from another perspective. | 2015-07-23 |
20150205961 | DETECTING MALICIOUS SOFTWARE - A computer implemented method, apparatus, and program code for detecting malicious software components. A series of calls made by a software component is monitored to identify an identified respective series of call types to components named in said calls. A determination is made as to whether the identified respective series of call types to components named in said calls is indicative of malicious behavior. | 2015-07-23 |
20150205962 | BEHAVIORAL ANALYTICS DRIVEN HOST-BASED MALICIOUS BEHAVIOR AND DATA EXFILTRATION DISRUPTION - A system and method detects the existence of malicious software on a local host by analysis of software process behavior including user input events and system events. A user validation engine provides user notification. In-VM operating system monitors capture events handled by the OS, capture user input from the HMI devices, and capture system events from applications executed by the processor at hardware, kernel and/or API levels. The In-VM operating system monitors also pass captured user input and system events to the user validation engine for analysis. The user validation engine identifies legitimate user events as those that move from the hardware level upward to pre-selected applications, identifies illegitimate user events as those that start at the kernel and/or API levels, and approves communication for legitimate events while denying communication for illegitimate events. | 2015-07-23 |
20150205963 | METHOD AND DEVICE FOR EXTRACTING MESSAGE FORMAT - Examples of extracting a message format are disclosed. Extracting the message format may include capturing an execution trace of a malicious program client and identifying and analyzing a processing procedure of a message in the execution trace. An input message format is identified based on the analysis, where the input message format is of a communication protocol used by a malicious program. The examples of identifying the message format provide increase extraction efficiency, accurate analysis and positioning, and a reduced rate of false positives. | 2015-07-23 |
20150205964 | TECHNOLOGIES FOR PROTECTING SYSTEMS AND DATA TO PREVENT CYBER-ATTACKS - Technologies for protecting systems and data of an organization from malware include a data integrity server configured to receive a data file for import from an external source. The data integrity server analyzes the received data file with multiple anti-malware engines to determine whether the data file includes hidden malware. The data integrity server discards the data file in response to a determination that the data file includes hidden malware. Additionally, the data integrity server verifies the type of the received data file based on the file extension associated with the received data file. The data integrity server cleans the received data file in response to verification of the file type. The cleaned data file is transmitted to a computing device to be imported. Other embodiments are described and claimed. | 2015-07-23 |
20150205965 | SYSTEMS AND METHODS FOR DETERMINING OVERALL RISK MODIFICATION AMOUNTS - Systems and computer-implemented methods for determining overall risk modification indicative of an amount by which an overall risk associated with a plurality of threats is modified by implementing a combination of security controls are disclosed. A computer-implemented method includes receiving a plurality of individual risk modification amounts. Each individual risk modification amount corresponds to a corresponding security control of the combination of security controls and a corresponding threat of the plurality of threats. Each individual risk modification amount of the plurality of individual risk modification amounts is indicative of an amount by which a risk associated with the corresponding threat is modified by implementing the corresponding security control. The method further includes determining, automatically by a computer, the overall risk modification amount based on the plurality of individual risk modification amounts. | 2015-07-23 |
20150205966 | Industrial Control System Emulator for Malware Analysis - Embodiments of the present invention may provide an Industrial Control System (ICS) Emulator for Malware Analysis. The ICS Emulator may be embodied in a software. The software may be developed by testing and operating thousands of ICS devices that are used every day in critical infrastructure from power to oil & gas. Then, based on the tests and operations, the software may be configured to identify if, when, and how malware may be attacking various industrial control systems. | 2015-07-23 |
20150205967 | METHOD FOR PROCESSING DATA STREAMS WITH MULTIPLE TENANTS - The present disclosure relates to the field of processing data in the stream processing network, such as processing data having data streams associated with multiple owners or entities. A method is disclosed of secure processing of input data by a stream processing network having first and second processing units, wherein the method can include: a) receiving input data from a communication channel, wherein the input data includes a first data stream associated with a first owner and a second data stream associated with a second owner; b) distinguishing data packets of the first data stream from that of the second data stream; and c) processing the first data stream with the first processing unit. | 2015-07-23 |
20150205968 | SHARED PREFERENCES IN A MULTI-APPLICATION ENVIRONMENT - Various aspects of the subject technology relate to a system configured to store preferences in a file that is accessible to other applications on a computing device. The preferences stored in the file may include application use preferences that specify an application to be launched and the conditions in which the application is to be launched. The system further includes features for protecting the preferences in the file from modification by unauthorized parties or applications. | 2015-07-23 |
20150205969 | COMPUTER ECOSYSTEM PROVIDING A PROCESS FOR DETERMINING TRUST IN CONTENT SHARING - A user can assign a level of trust to other users to manage what content they may access or share. The user also assigns to each level of trust content type that may be accessed by users having that level of trust. The user then sends tags to his contacts indicating their level if trust, which are then presented by the contacts to gain access to the user-defined content. | 2015-07-23 |
20150205970 | DATA ENCRYPTION USING AN EXTERNAL ARGUMENTS ENCRYPTION ALGORITHM - Data encryption using an external arguments encryption algorithm: it is an encryption system which uses symmetrical secret key algorithms but the operating arguments thereof and/or the actual encryption/decryption algorithm is/are unknown before use and is/are created at the time of encryption and then destroyed but is/are stored in an independent or non-independent computer or non-computer system (paper, human memory, other non-computer media, etc.) of the system which encrypts or decrypts the data/message for the subsequent reuse thereof at the time of decryption. It will be used as a client/server system, wherein the client uses a set of variable arguments and/or the actual algorithm which is/are stored, however, outside the actual client in the server. The operating arguments and/or the actual encryption/decryption algorithm may be generated/used both by the client and by the server but is/are stored exclusively in the server (whether this is a computer or non-computer storage system) in a manner independent of the client, which makes it possible to control and/or limit the use thereof. | 2015-07-23 |
20150205971 | Creating a Single Playlist with Multiple Authors - A method for creating a single playlist with multiple authors is disclosed. The method includes receiving, by a content sharing platform from a first user that is an author of a playlist of the content sharing platform, an indication of a second user to invite as another author of the playlist, the indication comprising an identifier of the second user and permissions corresponding to the second user, sending an invitation to the second user requesting the second user to be an author of the playlist, and when the second user accepts the invitation, storing the identifier of the second user and the permissions as metadata of the playlist, the second user to be allowed to interact with the playlist in accordance with the permissions corresponding to the second user. | 2015-07-23 |
20150205972 | PERSONAL ELECTRONIC DEVICE AND DATA THEFT PREVENTION SYSTEM AND METHOD THEREOF - Data theft prevention technology for a personal electronic device is provided. When an internet-communication address of the personal electronic device is detected by a server through the internet and the server determines that the detected internet-communication address has been listed in a lost list, a processing unit of the personal electronic device operates in accordance with anti-theft software to execute the codes contained in a BIOS memory of the personal electronic device to set a medium password for a user-data storage medium of the personal electronic device and to prohibit the use of the personal electronic device. | 2015-07-23 |
20150205973 | METHOD AND APPARATUS FOR PROVIDING DATA SHARING - Provided are a method and apparatus for data sharing based on an individual environment setup. An access control unit authenticates the user having requested a data object, and extracts the individual environment setup of the user. The individual environment setup includes a list of data objects possessed by the user and access information on each data object in the list. A service unit acquires the data object requested from a distributed file system unit using the individual environment setup, and provides the requested data object to the user. | 2015-07-23 |
20150205974 | SYSTEMS AND METHODS FOR MULTI-TENANT DATA PROTECTION APPLICATION - A system for providing a multi-tenant data protection application includes a server shared by all tenants for access to the provided multi-tenant data protection application. The system further includes business logic for managing tenants of the multi-tenant data protection application, tenant resource allocation and isolation of tenant operating environments. The system additionally includes a database server for creating, managing and maintaining databases, including a master database used to store configuration and monitoring data which is used for tenant management and monitoring, and a plurality of private tenant databases, each used to store tenant-specific configuration, tenant-specific data and associated tenant resources. The system includes one or more data protection engines configured to store a copy of protected data at tenant redundant data stores. | 2015-07-23 |
20150205975 | System and Method for Multipronged Authentication - Various embodiments of a system and method for multipronged authentication are described. Embodiments may include a client system that implements a runtime component configured to consume content. The client system may be configured to implement a digital rights management component configured to perform one or more cryptographic operations and also authenticate the runtime component. The client system may receive encrypted content from a remote computer system and receive a given authentication component from a remote computer system; that authentication component may be configured to authenticate the runtime component. The client system may, based on authentication of the runtime component by both the digital rights management component and the given authentication component, decrypt at least a portion of the encrypted content. In this way, the client system may ensure that decryption of the encrypted content may occur only if multiple components authenticate the runtime component, according to some embodiments. | 2015-07-23 |
20150205976 | SECURE ACCESS TO HEALTHCARE INFORMATION - A system and method for providing or exchanging healthcare information (e.g., medical information) to authorized users in a secure manner. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to: assign identification information to a plurality of users and a plurality of items; associate the identification information of a user of the plurality of users with one or more items of the plurality of items; set-up security policies including predetermined locations, within predetermined stages within a sequence and during predetermined times; and provide the user access to the one or more items when there is a matching between the identification information of the user and the one or more items, and all of the security policies associated with the user and the one or more of the plurality of items are met. | 2015-07-23 |
20150205977 | COMPARTMENT-BASED DATA SECURITY - An embodiment of a non-transitory computer-readable storage medium stores instructions which, when processed by a processor, cause the processor to implement a method of securing data. The method includes: creating a user-controlled compartment associated with an object security label, the user-controlled compartment configured to be administered by a first user, the first user being associated with a first security label; storing, by the first user, a data set as an object in a data storage system accessible by multiple users, and associating the object with the object security label; and associating the first user security label with the user-controlled compartment, the user-controlled compartment defining access to the object as set by the user. | 2015-07-23 |
20150205978 | METHODS AND APPARATUS FOR SECURELY DISPLAYING DIGITAL IMAGES - The invention provides methods and apparatus for securing personalized or sensitive information appearing in digital images. Digital images containing information to be secured is processed and divided into a plurality of image cells. At least one image cell from the plurality of image cells is selected and redacted or altered to render the information to be secured with the selected image cells indecipherable. The invention also provides methods and apparatus for transmitting or streaming unredacted image cells alone or in combination with redacted image cells for secured viewing on a user browser or computer. | 2015-07-23 |
20150205979 | METHOD AND SYSTEM FOR REPAIRING FILE AT USER TERMINAL - Provided are a method and system for repairing a file at user terminal. The method comprises: scanning a file at user terminal, determining whether the file is abnormal, and acquiring file characteristics information; if the file is abnormal, then according to the file characteristics information, acquiring from a cloud server a secure file corresponding to the abnormal file and uploaded before abnormity occurring, wherein the secure file in the cloud server is acquired by directly uploading file of user terminal; and replacing the corresponding abnormal file of the user terminal with the secure file. The method and system save the secure files of each user terminal in a cloud server, and when an abnormal file occurs in the user terminal, download the secure version of a corresponding file from the cloud server to replace the local abnormal file, thus ensuring recovery of the correct version of the file into the system, and solving the problems that the abnormal file cannot be restored to normal status during the conventional file repair process or cannot be repaired due to complexities caused by virus infection. | 2015-07-23 |
20150205980 | INFORMATION ACQUISITION APPARATUS, INFORMATION ACQUISITION METHOD, AND NON-TRANSITORY RECORDING MEDIUM - The imager and controller of an information apparatus images the back face of another information apparatus to acquire the manufacturing number of the other information apparatus corresponding to the two-dimensional bar code provided on the back face of the other information apparatus and acquire visible light information corresponding to blinking of light emitted by the light emitter arranged on the back face of the other information apparatus. Furthermore, the controller controls the imager so as to be able to image the two-dimensional bar code and the light emitted by the light emitter. | 2015-07-23 |
20150205981 | Handheld Communication Device Supporting Base - A handheld communication device supporting base is disclosed. The handheld communication device supporting base is used for placing a handheld communication device and reading a card. The handheld communication device supporting base includes a handheld communication device placement notch, a reader device, and a processor. The handheld communication device placement notch is used for placing the handheld communication device. The reader device is located next to the handheld communication device placement notch, used for reading the card, to obtain the reading information. The processor is electrically connected to the reader device, used for transferring the reading information to the handheld communication device via the handheld communication device placement notch, allowing the reading information to be transferred via the handheld communication device. | 2015-07-23 |
20150205982 | NON-CONTACT DATA CARRIERS INCLUDING AN ANTI-COLLISION SCHEME - Data carriers for inventorying by means of a communication station, whereby the communication station and each data carrier are brought into communicative connection, and each data carrier brought into communicative connection with the communication station is configured to generate a response signal that renders possible an inventorying of the data carrier and is capable of delivering a generated response signal with the use of a transmission start moment that can be selected from a plurality of transmission start moments, each data carrier tests whether another data carrier is already giving its response signal. Each data carrier is configured to discontinue the generation or delivery of its response signal if another data carrier is already providing its response signal. | 2015-07-23 |
20150205983 | RFID System and Method - An RFID system includes an RFID antenna assembly configured to be positioned on a product module assembly of a processing system. The product module assembly is configured to releasably engage at least one product container. A first RFID tag assembly configured to be positioned on the at least one product container. The at least one product container is configured to position the first RFID tag assembly within a detection zone of the RFID antenna assembly whenever the product module assembly releasably engages the at least one product container. | 2015-07-23 |
20150205984 | OPTICAL COMMUNICATION USING DIFFERENTIAL IMAGES - Techniques related to optical communication including techniques for communicating barcodes using differential images. | 2015-07-23 |
20150205985 | METHODS FOR ORGANIZING THE DISINFECTION OF ONE OR MORE ITEMS CONTAMINATED WITH BIOLOGICAL AGENTS - The invention provides method for organizing the disinfection of one or more items contaminated with biological agent(s) comprising (a) attaching a radio-frequency ID (RFID) tag to an item(s) to be disinfected; exposing the item(s) of (a) to a disinfecting means for a period sufficient to disinfect the item; and (c) obtaining a signal from the tagged item when disinfection is complete thereby organizing the disinfection of one or more items. | 2015-07-23 |
20150205986 | RFID INTERROGATION PROBE - An RFID interrogation probe ( | 2015-07-23 |
20150205987 | METHOD FOR ENHANCING STABILITY OF COMMUNICATION BETWEEN A CONTACTLESS CARD AND A CARD READER - The invention discloses a method for enhancing stability of communication between a contactless card and a card reader, relating to communication field. In the method, the card reader initiates time-out timing and a receiver, waits for receiving data, when the time-out does not happen and sub-carrier wave is detected, the card reader stops time-out timing, receives data and determines whether there is frame error in the received data frame, if yes, discards the data frame and goes on time-out timing; otherwise, determines whether CRC check and/or parity check of the data frame is correct, if the CRC check and/or the parity check of the data frame are correct, determines whether there is other error in the data frame, if there is other error in the data frame, discards the data frame and goes on time-out timing; if there is not other error in the data frame, shuts down the receiver and sends the received data to a host; or if the CRC check and/or the parity check of the data frame are not correct, determines whether length of the data frame is smaller than preset byte, if length of the data frame is smaller than preset byte, discards the data frame and goes on time-out timing; if length of the data frame is not smaller than preset byte, determines whether the data frame is integrate, if the data frame is integrate, shuts down the receiver; if the data frame is not integrate, discards the data frame and goes on time-out timing. | 2015-07-23 |
20150205988 | METHOD FOR READING DATA STORED IN AN ELECTRONIC DEVICE FOR A TYRE - A method is provided for reading data relating to a tyre, in which the data is stored in an electronic device integrated into the tyre, and in which the tyre is identified by a serial number and a manufacturing week number. A storage unit of the electronic device includes a data storage zone having a storage range formed of a number of bits. The storage range is also referred to as a restricted range, and the number of bits of the restricted range is less than or equal to 38. According to the method, the data stored in the restricted range is read, and the data read from the restricted range is decoded in order to determine the serial number and the manufacturing week number of the tyre. | 2015-07-23 |
20150205989 | METHODS AND SYSTEMS FOR GPS-ENABLED BAGGAGE TAGS - An electronic baggage tag is self-reliant and self-regulating and provides the underlying foundation for a baggage tracking and management system, the center of which operates one or more tag service provider servers. The tag is attached to a baggage and is loaded with various data, including passenger itinerary, GPS data, and journey profile data. The tag has sensors, such for detecting different vibrations, electro-magnetic sensor, GPS, and others. As the baggage to which the tag is attached goes on its journey, the sensors detect stimuli and ascertain where in the journey the baggage is and use itinerary and other data to determine where the baggage should be. The tag service provider server communicates with the tag at various stages in the journey, providing up-to-date itinerary data to the tag. The tag automatically shuts off to be compliant with government regulations for devices in flight. | 2015-07-23 |
20150205990 | SYSTEM AND METHOD FOR NEAR FIELD COMMUNICATION - Systems, methods, and devices are provided for a near-field communication (NFC) system for use with mobile computing device. In an embodiment, an RFID reader device is configured for operation with a smart phone using the audio (headphone) port, and which is entirely powered and controlled by the mobile computing device through the audio port. A specially tuned charge pump ladder is used for powering the RFID reader device over a TRRS connection with the mobile computing device, without requiring an internal power source, such as a battery, in the RFID reader device. In an embodiment, an app running on the mobile computing device includes functionality for providing power and data channels over the TRRS port to the RFID reader device. | 2015-07-23 |
20150205991 | INTERNET-OF-THINGS SYSTEM FOR PUBLIC TRANSPORTATION SERVICE AND METHOD OF OPERATING SAME - An Internet-of-Things (IoT) system for public transportation service and a method of operating the same are disclosed. The IoT system includes on-vehicle devices, a management server, a plurality of bus stop access points (APs), and a wired/wireless bus stop access point (AP) communication network. The on-vehicle devices are mounted within a bus, i.e., a public transportation means. The management server is connected to the bus over an Internet, i.e., a wireless communication means. The plurality of bus stop APs are short distance communication APs, and are each provided in each bus stop at which the bus stops and configured to enable information to be exchanged between the bus stop and the bus. The wired/wireless bus stop AP communication network connects the plurality of bus stop APs. The management server performs Internet access processing to connect the bus stop AP communication network and an external terminal. | 2015-07-23 |
20150205992 | MULTISPECTRAL IMAGING BIOMETRICS - Methods and systems are provided for performing a biometric measurement on an individual. A purported skin site of the individual is illuminated under a plurality of distinct optical conditions during a single illumination session. Light scattered beneath a surface of the purported skin site is received separately for each of the plurality of distinct optical conditions. A multispectral image of the purported skin site is derived from the received light. A biometric function is performed with the derived multispectral image. | 2015-07-23 |
20150205993 | METHOD FOR PROVIDING CONTROL FUNCTION USING FINGERPRINT SENSOR AND ELECTRONIC DEVICE THEREOF - An apparatus and a method for providing a control function using a fingerprint sensor in an electronic device are provided. The method includes collecting information based on occurrence of an event, detecting a touch input on a fingerprint sensor, and performing a control function for the information based on the touch input on the fingerprint sensor. | 2015-07-23 |
20150205994 | SMART WATCH AND CONTROL METHOD THEREOF - A smart watch and a control method thereof are provided. A smart watch includes a display having a position that is changeable; an estimation-based position controller configured to determine an initial target position based on a face position and control the display to be moved to the determined initial target position; a face position determiner configured to, based on a face recognition result, determine whether a face exists in front of the display positioned at the initial target position; and a face recognition-based position controller configured to, in response to determining a face does not exist in front of the display, determine a modified target position to enable the display to be positioned toward a face and control the display to be moved to the modified target position. | 2015-07-23 |
20150205995 | PERSONAL RECOGNITION APPARATUS THAT PERFORMS PERSONAL RECOGNITION USING FACE DETECTING FUNCTION, PERSONAL RECOGNITION METHOD, AND STORAGE MEDIUM - A personal recognition apparatus is disclosed which improves accuracy of personal recognition. A face region of a person included in a frame image is detected, and characteristic data is generated from the face region. For a plurality of persons, at least a piece of characteristic data for recognizing a person and a recognition history are stored for each of the characteristic data. Personal recognition is performed by comparing the generated characteristic data and stored characteristic data with each other and identifying a person having the generated characteristic data among the plurality of persons. The recognition history is updated based on a result of the personal recognition, and when data causing false recognition is included in the characteristic data stored for a predetermined individual, and the predetermined individual can be correctly recognized using other characteristic data, data is deleted or a priority of the data causing false recognition is lowered. | 2015-07-23 |
20150205996 | METHODS AND SYSTEMS FOR DETECTING BIOMETRIC CHARACTERISTICS IN AN IMAGE - A method for detecting biometric characteristics in a captured biometric data image is provided that includes determining, by a processor, an approximate location for a biometric characteristic in a frame included in captured biometric data, and determining region of interest positions over the frame. Moreover, the method includes calculating a set of feature values for each position, generating a displacement for each set of feature values and generating a median displacement, and adjusting the biometric characteristic location by the median displacement. | 2015-07-23 |
20150205997 | METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR HUMAN-FACE FEATURES EXTRACTION - The present invention provides a method for obtaining a human-face feature vector from a video image sequence, comprising: detecting a same human-face image in a plurality of image frames of the video sequence; dividing the detected human-face image into a plurality of local patches with a predetermined size, wherein each local patch is around or near a human-face feature point; determining a correspondence relationship between respective local patches of the same human-face image in the plurality of image frames of the video sequence; and using human-face local feature vector components extracted from respective local patches having a mutual correspondence relationship to form human-face local feature vectors representing facial points corresponding to the local patches. Besides, the present invention further provides an apparatus for obtaining a human-face feature vector from a video image sequence and a corresponding computer program product. | 2015-07-23 |
20150205998 | USER AUTHENTICATION METHOD AND APPARATUS - A user authentication method includes extracting a facial landmark from each of a first input image and a second input image; generating a first sparse code of the facial landmark extracted from the first input image and a second sparse code of the facial landmark extracted from the second input image; and determining whether a user is to be authenticated based on the first sparse code of the first input image and the second sparse code of the second input image. | 2015-07-23 |
20150205999 | TRAFFIC CONTROL APPARATUS, METHOD THEREOF, AND PROGRAM THEREFOR - There is provided a traffic control apparatus including: an image input unit configured to input an image including a face of a user; a face detecting unit configured to detect a face area of the user from the image; a generating unit configured to obtain a difference between a state of the detected face area and a state of a optimal face area, and generate presentation information for instructing the user to move his or her face to a position suitable for the face recognition when the difference is large; and a noticing unit having a plurality of keys arranged in a matrix pattern, and configured to illuminate, blink, or extinguish one or the plurality of keys for specifying the position that the face is to be moved to on the basis of the presentation information. | 2015-07-23 |
20150206000 | BACKGROUND ANALYSIS OF MENTAL STATE EXPRESSIONS - Expression analysis is performed via a background process and provided to foreground applications that register for emotion services. The foreground services are provided notification when a particular, previously determined emotional state is detected. The emotional state can be identified using facial feature analysis and/or gesture analysis. Upon receiving the notification of the state from the background process, the foreground services perform an emotion response action. The emotion response action can include sending a reply message indicating that a desired emotional response has been detected, providing a reward, and/or generating an automatic like on a social media system. | 2015-07-23 |
20150206001 | Method and device for classifying a behavior of a pedestrian when crossing a roadway of a vehicle as well as passenger protection system of a vehicle - A method for classifying a behavior, of a pedestrian when crossing a roadway of a vehicle, includes reading in a sensor signal to detect the pedestrian and at least one piece of surroundings information regarding surroundings of the pedestrian. The sensor signal represents here a signal of at least one sensor of the vehicle. The method further includes ascertaining at least one physical variable of a correlation between the pedestrian and the at least one piece of surroundings information. Finally, the method includes classifying the behavior of the pedestrian using the at least one physical variable. | 2015-07-23 |
20150206002 | OBJECT TRACKING IN A VIDEO STREAM - A computing device for tracking an object in an image stream, said computing device comprising a memory and a controller, wherein said controller is configured to: receive an image stream comprising at least a first and a previous image of an object to be tracked, determine contour lines in at least said first image, wherein said contour lines comprises a plurality of points, determine and assign at least one descriptor to each point, filter out points based on the descriptors, determine relative distances between each point in said first picture with each point in said previous picture, which points have not been filtered out; and determine a maximum occurrence for the relative distances, wherein the maximum occurrence corresponds to a movement of said object to be tracked in the plane. A movement in a direction parallel to the line of sight is determined from an average position, a relative distance and slopes of linear fittings for each point-component of the points in the two images. | 2015-07-23 |
20150206003 | Method for the Real-Time-Capable, Computer-Assisted Analysis of an Image Sequence Containing a Variable Pose - The invention relates to a method for the real-time-capable, computer-assisted analysis of an image sequence of an object consisting of elements that can be moved relative to each other and are interconnected, said sequence containing a variable pose, wherein the individual images of the image sequence are recorded by way of a time-of-flight (TOF) camera such that said images can be processed by a computer, and contain brightness and distance data as functions of the pixel coordinates of the camera for each image of the sequence, comprising the following steps: a. Capturing the pixels of an individual image forming the object, b. calculating a three-dimensional (3D) point cloud in a virtual space, said point cloud representing the surface of the object that is visible to the camera, by a computational projection of object-depicting pixels in such a space, while taking captured distance data to the object into consideration, c. fitting a model of the object consisting of nodes and edges into the computer-generated 3D point cloud for the individual images, wherein the nodes represent a selection of elements of the object and the edges represent the connections of said elements amount each other, d. iteratively updating all node positions by applying a learning rule for training a self-organizing map having a previously defined number of randomly selected dots of the point cloud, e. repeating steps a. to d. for each subsequent individual image of the sequence, wherein for the fitting in step c. the result of step e. of the preceding image is used in each case, and f. determining the varying pose from the positions of predetermined nodes of the model which have been captured in at least representative images of the image sequence. | 2015-07-23 |
20150206004 | OBJECT TRACKING METHOD AND DEVICE - Disclosed is an object tracking method comprising steps of obtaining a grayscale image sequence and a depth image sequence; predicting a candidate target region of a tracking object in a current image; determining a depth weight image of the candidate target region; acquiring a target template which is expressed by a probability density distribution of features; expressing, by a probability density distribution of features, a candidate target whose position moves in the candidate target region; calculating, based on a probability density expression of the target template and a probability density expression of the candidate target, a similarity between the target template and the candidate target, so as to get a confidence level image of the candidate target region; and locating, based on the confidence level image of the candidate target region, a position of the tracking object in the current image. | 2015-07-23 |
20150206005 | METHOD OF OPERATING HANDWRITTEN DATA AND ELECTRONIC DEVICE SUPPORTING SAME - An electronic device is provided. The electronic device includes a display module configured to generate an event corresponding to a handwritten data input and a control module configured to recognize a stroke of handwritten data, collect input time information on at least one stroke and store or transmit a message including stroke related information and the input time information. | 2015-07-23 |
20150206006 | IMAGE PROCESSING APPARATUS, NON-TRANSITORY COMPUTER READABLE MEDIUM, AND IMAGE PROCESSING METHOD - An image processing apparatus includes a receiving unit and a selecting unit. The receiving unit receives an image of a document. The selecting unit selects a character recognition result in a first frame of the document from plural character recognition candidates in the first frame on the basis of definition information defining a relationship between a character string in the first frame of the document and a character string in a second frame of the document different from the first frame. | 2015-07-23 |
20150206007 | SYSTEM AND METHOD FOR DOCUMENT GROUPING AND USER INTERFACE - Systems and methods for grouping documents and/or displaying groupings are described herein. Documents may be grouped by their document character features. Document character features may include distinct character types, character counts, common character counts, character difference counts, missing character counts, and any combination thereof. Document matches may be based on a threshold value compared to a score and/or indicator based on document character features. The computing devices described herein may generate user interfaces for displaying clusters of documents. The clusters of documents may indicate matches between documents based on the document character features. | 2015-07-23 |
20150206008 | EYE IMAGING IN HEAD WORN COMPUTING - Aspects of the present invention relate to methods and systems for imaging, recognizing, and tracking of a user's eye that is wearing a HWC. Aspects further relate to the processing of images reflected from the user's eye and controlling displayed content in accordance therewith. Aspects further relate to determining health conditions of the user based on eye imaging technologies. | 2015-07-23 |
20150206009 | MOVING OBJECT DETECTION METHOD - When correction values are respectively determined for noise components of “OFFSET COMPONENT OF CCD ELEMENT”, “GRADATION COMPONENT OF BACKGROUND LIGHT” and “OFFSET COMPONENT OF OPTICAL SYSTEM”, the pixel values including as less of these noise components as possible are evaluated. The evaluated pixel values include a noise component of “THERMAL NOISE PLUS READOUT NOISE COMPONENT” which is superposed onto the pixel values. With this taken into consideration, a moving object detection method of an embodiment photographs multiple images of a moving object being an observation object with a photographic area fixed, selects the smallest pixel value in each group of corresponding pixels across the images from image signals representing the images, evaluates image signals including as less of the four noise components as possible by using the smallest pixel value as the correction value for the four noise components. | 2015-07-23 |
20150206010 | DISPLAY CONTROL DEVICE AND METHOD - A display control device includes circuitry configured to detect a specific object that is supported by an authentication target in an image, obtain content data associated with the specific object, the content data including a registered image of a registered user and positional information between the specific object and the registered image, and control a display to superimpose the registered image on the image at a position based on the positional information in order to provide a comparison between the authentication target and the registered user. | 2015-07-23 |
20150206011 | WEARABLE EMOTION DETECTION AND FEEDBACK SYSTEM - A see-through, head mounted display and sensing devices cooperating with the display detect audible and visual behaviors of a subject in a field of view of the device. A processing device communicating with display and the sensors monitors audible and visual behaviors of the subject by receiving data from the sensors. Emotional states are computed based on the behaviors and feedback provided to the wearer indicating computed emotional states of the subject. During interactions, the device, recognizes emotional states in subjects by comparing detected sensor input against a database of human/primate gestures/expressions, posture, and speech. Feedback is provided to the wearer after interpretation of the sensor input. | 2015-07-23 |
20150206012 | SYSTEM FOR AUTOMATICALLY TRACKING A TARGET - A method for tracking a cinematography target that has been associated with an emitter can comprise receiving an indication to track a particular identifier. The particular identifier can be associated with an object of interest. The method can further comprise identifying, using at least one tracker component, a direction associated with the particular identifier. The method can also include calculating a motor actuation sequence necessary to actuate a control component to track the object of interest with an audiovisual device. The method can further comprise actuating at least one motor to track the object of interest. | 2015-07-23 |
20150206013 | EXTRACTION METHOD AND DEVICE - An extraction method includes acquiring a captured baseball game footage that includes a plurality of frames; and extracting, as a frame representing a first pitching scene of a plate appearance, a frame corresponding to an initial state of a ball count from among frames representing pitcher pitching scenes included in the captured baseball game footage. | 2015-07-23 |
20150206014 | VIDEO-BASED SYSTEM FOR AUTOMATED DETECTION OF DOUBLE PARKING VIOLATIONS - A method for detecting a double-parked vehicle includes identifying a parking region in video data received from an image capture device monitoring the parking region. The method includes defining an enforcement region at least partially surrounding the parking region. The method includes detecting a stationary vehicle in the enforcement region. The method includes determining the occurrence of an event relative to the stationary vehicle. In response to the determined occurrence of the event, the method includes classifying the stationary vehicle as being one of double parked and not double parked. | 2015-07-23 |
20150206015 | Method for Estimating Free Space using a Camera System - A method estimates free space near a moving object from a sequence of images in a video acquired of a scene by a camera system arranged on the moving object by First constructing a one-dimensional graph, wherein each node corresponds to a column of pixels in the image. Features are determined in the image, and an energy function is constructed on the graph based on the features. Using dynamic programming, the energy function is maximized to obtain the free space. | 2015-07-23 |
20150206016 | DRIVING IMAGE AUXILIARY SYSTEM - A driving image auxiliary system includes a planar image capturing unit, a three-dimensional image building unit, a controlling unit, and a displaying unit. The controlling unit is connected with the planar image capturing unit and the three-dimensional image building unit. According to the planar image acquired by the planar image capturing unit and the three-dimensional image built by the three-dimensional image building unit, the controlling unit generates a driving auxiliary information. The displaying unit is connected with the controlling unit. After the driving auxiliary information is received by the displaying unit, a driving auxiliary image corresponding to the driving auxiliary information is shown on the displaying unit. | 2015-07-23 |
20150206017 | ROAD ENVIRONMENT RECOGNITION DEVICE - This road environment recognition device is equipped with: a connecting line determination unit, which determines primary connecting lines indicating lane marks by setting candidate points at a position near a vehicle as starting points, and sequentially connecting two or more candidate points along a first direction, which is a direction away from the vehicle; and branch point determination unit, which determines whether a branch point exists on the primary connecting lines on the basis of the positional relationships between the primary connecting lines and a residual candidate point that does not form part of the primary connecting lines. | 2015-07-23 |
20150206018 | SYSTEM AND METHOD FOR RECOGNIZING SPEED LIMIT SIGN USING FRONT CAMERA - Disclosed herein are a speed limit sign recognition system and method using a front camera which can track a traffic sign continuously appearing in images which are obtained by a photographing speed limit sign located in front of a driver using a camera mounted on the front of the vehicle, recognize an internal numeral of the traffic sign, and inform the driver of an actual limit speed through the recognized numeral, including: an image acquisition unit for acquiring a front image using a front camera; a traffic sign detector for detecting a traffic sign from the acquired front image; a recognition unit for recognizing an internal numeral in the detected traffic sign; a tracking unit for tracking a traffic sign continuously appearing in the front image, and eliminating a temporarily misrecognized object; and a decision unit for determining a result of speed limit recognition on the recognized traffic sign. | 2015-07-23 |
20150206019 | METHODS FOR IDENTITY AUTHENTICATION AND HANDHELD ELECTRONIC DEVICES UTILIZING THE SAME - A handheld electronic device includes a camera module, a flashlight module and a processor. The processor is configured to generate a flashlight indication signal having one or more pulse(s) distributed over time, direct the flashlight module to turn on a first light and a second light at different time based on the flashlight indication signal, direct the camera module to take pictures to obtain a stream of biological characteristic images comprising one or more first biological characteristic image(s) obtained when the first light is turned on and one or more second biological characteristic image(s) obtained when the second light is turned on, and compare the first biological characteristic image(s) with a first reference signature and compare the second biological characteristic image(s) with a second reference signature to obtain an identity authentication result. | 2015-07-23 |
20150206020 | QUALITY CONTROL METHOD FOR PRINTED PRODUCTS USING 3D DIGITAL PROOFING - A quality control method for printed products at a control console includes recording image information of the printed product with a camera device, comparing the recorded data to digital image data of the printed image in a computer, displaying a digital version of the printed product on a screen associated with the control console and illuminating the printed product with at least one light source. The printed product is sensed by using at least one sensor, the position of the printed product relative to the light source and/or relative to the angle of vision of a person is calculated by using a computer, and the displayed digitized version of the printed product is displayed on the screen in accordance with or corresponding to the position of the real printed product. | 2015-07-23 |
20150206021 | METHOD AND APPARATUS FOR SMOOTHING IMAGE - A method and apparatus for smoothing an image representing foreground or background. The method comprises: dividing the image in a specified granularity; for a block divided containing a blank pixel and a non-blank pixel, modifying a value of the blank pixel to a value obtained from a value of the non-blank pixel to obtain a filled block; obtaining the block smoothed by performing singular value decomposition on a matrix of pixels of the filled block, wherein values in the matrix of pixels of the block smoothed is calculated as a product of the obtained singular value, a left singular vector, and a transpose of a right singular vector; and for each of the non-blank pixels in the block smoothed, restoring the values of the non-blank pixels to initial values before the filling step, so as to obtain a reconstructed block. | 2015-07-23 |
20150206022 | SYSTEM AND METHOD FOR CLASSIFYING A SKIN INFECTION - A system and computer-implemented method for classifying skin disorders using an image of a skin portion is provided. The system comprises a server configured to receive the image of the skin portion from an electronic communication device and process the received image of the skin portion, wherein the processing comprises at least one of: resizing, removing artifacts and noise, applying new color space, sharpening the image and correcting background. Furthermore, the server is configured to segment the processed image to identify the region of interest within the processed image and extract one or more features from the identified region of interest. The system further comprises a trained learning module configured to classify the skin disorder by mapping the extracted features with pre-stored images, wherein the pre-stored images that map with the extracted features are associated with a particular category of skin disorder. | 2015-07-23 |
20150206023 | OPTICAL DATA PROCESSING DEVICE, OPTICAL DATA PROCESSING SYSTEM, OPTICAL DATA PROCESSING METHOD, AND OPTICAL DATA PROCESSING PROGRAM - A processing for specifying a correspondence relationship of feature points between two sets of optical data can be highly precise and efficiently carried out. The correspondence relationship of the perpendicular edges is obtained based on the assumption that the object is a building, in the processing for integrating the three-dimensional model obtained from the point cloud position data and the three-dimensional model obtained from the stereophotographic image. In this case, one perpendicular edge is defined by the relative position relationship with the other perpendicular edge, and the correspondence relationship is high-precisely and rapidly searched. | 2015-07-23 |
20150206024 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND STORAGE MEDIUM - An image processing apparatus includes a selection unit, a pixel number setting unit, a determination unit, and a processing unit. The selection unit selects at least a pixel that is different from a pixel of interest in an image based on a similarity between a pixel value of the pixel different from the interest pixel and a pixel value of the interest pixel. The pixel number setting unit sets a number of pixels to be selected. The determination unit determines, from a pixel selected by the selection unit and based on whether a number of selected pixels has reached the set number of pixels, at least a pixel to be used in predetermined processing. The processing unit performs the predetermined processing on the interest pixel using a pixel value of the pixel determined by the determination unit. | 2015-07-23 |
20150206025 | METHOD FOR IDENTIFYING AND EXTRACTING A LINEAR OBJECT FROM AN IMAGE - A method for identifying and extracting a linear object from an image is disclosed. The method comprises: acquiring an original image to be processed, wherein the original image is taken by a camera, received through network transmission or copied from a compact disc or a removable disk; preprocessing the original image to obtain an enhanced image; extracting an edge information image from the enhanced image; then extracting linear features by performing, on the edge information image, a linear feature extracting transform improved with a cluster operator; finally; identifying and extracting the linear object by distinguishing the linear object from other linear features by considering characteristics of the linear object to be identified and extracted. According to the invention, a linear feature extracting transform improved with a cluster operator is constructed from a distribution of edge pixels in the edge information image along a 2-dimensional direction, which makes it possible to extract, rapidly and accurately, weak linear objects such as power lines from images having complicated background and sub-pixels. | 2015-07-23 |
20150206026 | METHOD OF GENERATING FEATURE VECTOR, GENERATING HISTOGRAM, AND LEARNING CLASSIFIER FOR RECOGNITION OF BEHAVIOR - Example embodiments disclose a method of generating a feature vector, a method of generating a histogram, a learning unit classifier, a recognition apparatus, and a detection apparatus, in which a feature point is detected from an input image based on a dominant direction analysis of a gradient distribution, and a feature vector corresponding to the detected feature point is generated. | 2015-07-23 |
20150206027 | SYSTEMS AND METHODS FOR ANALYTIC DATA GATHERING FROM IMAGE PROVIDERS AT AN EVENT OR GEOGRAPHIC LOCATION - The invention relates to a system and method of gathering and analyzing data from device operators aiming their image capture devices and thereby creating a line of sight to an object of interest, for example through the process of obtaining photographs, videos or other digital images of an event or geographical location, where the real-time or embedded location, compass heading, and time data from each of a plurality of image providers are communicated from the plurality of image-capture devices to one or more servers for statistical analysis of the proportionate amount of providers focusing on each image target or sub-target at the event or location. | 2015-07-23 |
20150206028 | POINT CLOUD REDUCTION APPARATUS, SYSTEM, AND METHOD - In a point cloud reduction method, a point cloud model and a predetermined reduction ratio are received, and a boundary box of the point cloud model is computed and divided into a plurality of grids according to the predetermined reduction ratio. A point set which includes points in the one or more adjacent grids is obtained and a plane which intersects with a center point of the point set and takes a feature vector of the point set as a normal vector is constructed. A curvature of each point in the point set to the constructed plane is computed, and then an average curvature is computed according to the curvature of each point. Points can be deleted from the point set according to differences between the curvatures of the points in the point cloud model with the average curvature, to generate a reduced point cloud model. | 2015-07-23 |
20150206029 | IMAGE MATCHING METHOD AND IMAGE PROCESSING SYSTEM - A processor of executes the following processes on one or more second feature point pairs for a first feature point pair from among created first pair candidates. A first vector is a vector that connects a first feature point of the first feature point pair and a first feature point of the second feature point pair. A second vector is a vector that connects a second feature point of the first feature point pair and a second feature point of the second feature point pair. The processor determines that a first feature point pair has been deleted from the first pair candidates, on the basis of a comparison result between a predetermined angle and an angle between the first vector and the second vector. The processor performs matching between the first image and the second image on the basis of feature point. | 2015-07-23 |
20150206030 | FACE OR OTHER OBJECT DETECTION INCLUDING TEMPLATE MATCHING - A template matching module is configured to program a processor to apply multiple differently-tuned object detection classifier sets in parallel to a digital image to determine one or more of an object type, configuration, orientation, pose or illumination condition, and to dynamically switch between object detection templates to match a determined object type, configuration, orientation, pose, blur, exposure and/or directional illumination condition. | 2015-07-23 |
20150206031 | METHOD AND SYSTEM OF IDENTIFYING AN ENTITY FROM A DIGITAL IMAGE OF A PHYSICAL TEXT - A method of identifying an entity from text in a digital image includes the step of obtaining a digital image. The digital image includes a digital photograph of a physical text. At least a portion of the physical text is related to a pre-defined topic. The digital photograph of the physical text is converted to a text in a computer-readable format. A word dictionary is provided. The word dictionary includes a set of words related to the pre-defined topic. A set of words of matching the text to similar words in the set of words in the word dictionary. A word cluster in the text is identified. Each word in the word cluster is associated with a category of a single entity. The single entity is a member of a class of entities demarcated by the pre-defined topic. A database including a list of members of the class of entities demarcated by the pre-defined topic is search for one or more entities matching one or more of word-category associations of the word cluster. | 2015-07-23 |
20150206032 | METHOD OF LEARNING A PARAMETER TO ESTIMATE POSTURE OF AN ARTICULATED OBJECT AND METHOD OF ESTIMATING POSTURE OF AN ARTICULATED OBJECT - A method of learning a parameter to estimate a posture of an articulated object, and a method of estimating the posture of the articulated object are provided. A parameter used to estimate a posture of an articulated object may be iteratively learned based on a depth feature corresponding to an iteration count, and the posture of the articulated object may be estimated based on the learned parameter. | 2015-07-23 |
20150206033 | METHOD OF IDENTIFYING PATTERN TRAINING NEED DURING VERIFICATION OF RECOGNIZED TEXT - Methods and systems for performing character recognition of a document image include analyzing verification performed by a user on a recognized text obtained by character recognition of a document image, identifying analogous changes of a first incorrect character for a first correct character, and prompting the user to initiate a training of a recognition pattern based on the identified analogous changes. | 2015-07-23 |
20150206034 | APPARATUS AND METHOD FOR RECOGNIZING OBJECT USING CORRELATION BETWEEN OBJECT AND CONTENT-RELATED INFORMATION - An apparatus and method for recognizing an object using correlation information about an object and content-related information which is generated based on the content-related information. The apparatus includes a data classifier, a data analyzer, a correlation manager, and an object identifier. | 2015-07-23 |
20150206035 | INFORMATION PROCESSING UNIT, PRINTING CONTROL METHOD FOR PRINTER DRIVER, AND COMPUTER PROGRAM PRODUCT - A information processing unit includes: a control unit configured to control operation processing of individual units through a user interface; a print set value storage unit configured to store a print set value that is set by operation of an operation unit on a basic setting screen displayed on a display unit on which setting relating to the color printing is performed at a basic level and a print detail set value that is set by operation of the operation unit on a detail setting screen as another dialog on which the setting is performed at a detail level under operation control of the control unit; and a print data creating unit configured to create print data of the color printing based on the print set value and the print detail set value under operation control of the control unit. | 2015-07-23 |
20150206036 | SYSTEM AND METHOD FOR GENERATING A USER INTERFACE FROM A PRINTER DESCRIPTION - Systems, methods, and machine-readable media for generating a user interface from a printer description file are discussed. The system comprising an interface module, an option module, and an interface generation module. The interface module may be configured to receive a printer description file comprising a plurality of printer options for a remote printer and the option module may be configured to select a subset of the plurality of printer options for the remote printer based on a list of prioritized printer options. The interface generation module may be configured to generate rendering code based on the subset of the plurality of printer options for the remote printer, the rendering code to enable a computing device to generate a user interface for the remote printer. The rendering code may be transmitted to a computing device in response to receiving, from the computing device, a print request for the remote printer. | 2015-07-23 |
20150206037 | DATA COMMUNICATION IN A PRINTING DEVICE - Apparatus and methods for the communication of data in a printing device are described. The apparatus enable communication between a control system and a plurality of printhead controllers. They have respective interface controllers for encoding and decoding one or more data streams that are communicated via a coupling medium. Print data is encoded for transmission as one or more data streams with a deterministic latency. Packet-based control data is also embedded in the one or more data streams. After receipt, the print data and the packet-based control data are extracted from the one or more data streams for control of at least the plurality of printhead controllers. Status data may also be encoded as a data stream and sent back to the control system. | 2015-07-23 |
20150206038 | PRINTING SYSTEM AND PRINTING CONTROL PROGRAM - A host computer ( | 2015-07-23 |
20150206039 | METHOD OF TRANSMITTING PARAMETER OF STORAGE CHIP OF IMAGING CARTRIDGE, STORAGE CHIP AND IMAGING CARTRIDGE - A method for transmitting a parameter of a storage chip of an imaging cartridge, a storage chip and an imaging cartridge are provided. The method includes: receiving an instruction transmitted by a print imaging device; and determining that the instruction is an instruction for reading a key parameter, and transmitting the key parameter to the print imaging device, where the key parameter is generated by the storage chip. In the application, the parameter to be read by the print imaging device is generated by the storage chip. When the printing imaging equipment transmits the reading instruction, the storage chip transmits the parameter generated by itself to the print imaging device. Therefore, the parameter cannot be directly read by the printing imaging equipment at any moment, and thus a certain important parameter in the storage chip can be prevented from being obtained maliciously. | 2015-07-23 |
20150206040 | TRANSPORTABLE DEVICE COMPRISING A TRANSPONDER - The invention relates to a transportable device with a transponder of an RFID system which draws its energy via the associated reading device. The transponder is disposed in a depression consisting of metal. The invention particularly relates to a transportable device used in storage facilities and on construction sites in connection with the erection of buildings, such as, for example, a formwork element, a transport container or a transport device for components such as anchoring rods or locking devices or other formwork element accessories. | 2015-07-23 |
20150206041 | ARRANGEMENT FOR CONNECTING SET VALUES CONCERNING PERFORMANCE TO AN ELECTRONICS DEVICE - Arrangement for connecting set values concerning performance relating to an electronics device to the electronics device, more particularly to a power electronics device, such as a frequency converter, which arrangement includes a rating plate part. The rating plate part is a separate unit belonging to the nameplate arrangement of the electronics device, which unit may be affixed to the electronics device. The rating plate part includes a memory member, in which values concerning the performance of the device are recorded. The rating plate part further includes an area in which information corresponding to the information recorded in the memory member is printed and which area remains visible when the rating plate part is affixed to the electronics device. | 2015-07-23 |
20150206042 | PAPERLESS RECEIPT RECORDING CARD - An electronic receipt card (ERC) is disclosed to replace paper receipts. The ERC allows a purchaser to keep a record of all his/her transactions in one location which can be carried along in the wallet along with other cards. This portable card can be presented at point of sell device transmitting the information from the cashier to the purchaser's card. Security procedures also verify the receiving device to avoid inadvertent transmissions and to provide addition security for the transmission. The transaction data received by the ERC is stored in the card and can be later uploaded into other electronic media, or display on the ERC card or through the ERC card reader device. | 2015-07-23 |
20150206043 | STRUCTURE OF TEXTILE - The present invention relates to a textile structure, which includes two yarns, a radio frequency identification (RFID) chip, and two antennas. The antennas are each electrically connected with the RFID chip. The antennas are respectively combined with the yarns. As such, with the combination of the yarns with the antennas, no tactile perception of irregularity will be sensed when a user touches and also, the comfortableness of wearing can be enhanced. | 2015-07-23 |
20150206044 | RFID WRIST BAND - The RFID wrist band includes an elastic block section including an airtight storage part, an elastic band section connected to the elastic block section to form an annular shape, and an inlay stored in the storage part and including a base substrate, an antenna on the base substrate, and an IC chip connected electrically with the antenna. The inlay is not fixed to an inner wall of the storage part, and the storage part is larger than a volume occupied by the inlay. | 2015-07-23 |
20150206045 | USER WEARABLE WIRELESS ENABLED ELECTRONIC APPARATUS - User-wearable electronic apparatus configured to enable wireless communications. In one embodiment, the apparatus takes the form of a wrist-worn apparatus (such as wristwatch) which includes a short-range radio frequency interface disposed therein at time of manufacture of the apparatus. The interface can be selectively encoded, such as after purchase, with user-specific information enabling the user to perform desired transactions (such as payment for goods and services), without having to carry other forms of payment with them. In one variant, the user-specific information includes data relating to one or more payment (e.g., debit/credit) accounts, and the transactions are authenticated via user-supplied biometric data such as e.g., a fingerprint, voiceprint, or facial recognition data. | 2015-07-23 |
20150206046 | CONTACTLESS CHIP CARD - The device contains a flat card, a microcircuit, a dielectric substrate onto which the microcircuit is installed, and an antenna, which is made of an electrical conductor provided along the periphery of and in the plane of the flat card and connected to the microcircuit. The antenna is in the form of a frame, made of an electrical conductor, and a dielectric layer, provided within the electrical conductor, with a hollow space being formed within the frame. At least one partition is installed in the hollow space within the frame, forming through-openings which run transversely relative to the plane of the flat card. One end of the partition is connected to the dielectric layer of the frame. The electrical conductor of the antenna is made of a noble metal. | 2015-07-23 |
20150206047 | METAL CARD WITH RADIO FREQUENCY (RF) TRANSMISSION CAPABILITY - A smart card with a metal layer which can capture radio-frequency (RF) signals via an antenna system is made operable by modifying the metal layer to enable passage of RF signals through the metal layer and/or by introducing a ferrite layer to enhance the efficient reception/transmission of RF signals by the antenna system. In one embodiment apertures are formed in and through the metal layer to allow RF signals to pass through the metal layer without negatively impacting the decorative or esthetic and/or reflective nature of the metal layer. These modifications allow for dual interface and contactless smart card formats. In other embodiments of the invention, a ferrite layer is formed between the metal layer and the inductors/antennas mounted within the smart card to enhance the efficient reception/transmission of RF signals. | 2015-07-23 |
20150206048 | CONFIGURING SPARSE NEURONAL NETWORKS - A method for selecting a reduced number of model neurons in a neural network includes generating a first sparse set of non-zero decoding vectors. Each of the decoding vector is associated with a synapse between a first neuron layer and a second neuron layer. The method further includes implementing the neural network only with selected model neurons in the first neuron layer associated with the non-zero decoding vectors. | 2015-07-23 |
20150206049 | MONITORING NEURAL NETWORKS WITH SHADOW NETWORKS - A method for generating an event includes monitoring a first neural network with a second neural network. The method also includes generating an event based at least in part on the monitoring. The event is generated at the second neural network. | 2015-07-23 |
20150206050 | CONFIGURING NEURAL NETWORK FOR LOW SPIKING RATE - A method for selecting a neuron model with a user defined firing rate for operating in a neural network includes selecting the neuron model based on a selected firing rate bandwidth. | 2015-07-23 |
20150206051 | METHOD AND COMPUTING SYSTEM FOR MODELLING A PRIMATE BRAIN - In one aspect the application relates to a computing system for providing data for modelling a human brain comprises a database including a plurality of datasets (or allow access to a plurality of datasets), each dataset including at least a dynamical model of the brain including at least one node and a neurodataset of a neuroimaging modality input. The at least one node include a representation of a local dynamic model and a parameter set of the local dynamic model. | 2015-07-23 |
20150206052 | ANALYSIS OF MEDICAL EQUIPMENT USAGE - For medical devices that apply radiation or other energy to patients, the way in which those devices are used may be analyzed to determine whether human factors are contributing to unnecessary doses of radiation, or to unnecessary wear-and-tear on the equipment. Medical equipment that applies energy to patients may leave a log, indicating who was operating the equipment and what protocols were used during the operation. The facility that owns the equipment may also have records, such as billing records or other institutional records. The equipment's logs, as well as the facility's records, may be analyzed in order to determine whether judgment of the technicians operating the equipment, or the physicians on whose orders the equipment is operated, are contributing to higher doses of radiation than necessary. The analysis may be used for regulatory reporting, or to correct human judgment errors, or to reduce use of consumables. | 2015-07-23 |
20150206053 | COMPUTING SYSTEM WITH COMPREHENSIVE SENSOR MECHANISM AND METHOD OF OPERATION THEREOF - A method of operation of a computing system includes: receiving data from multiple sources; creating a profile based on the data received from the multiple sources; and predicting, with a control unit, an affective state with the profile based on the data received from the multiple sources. | 2015-07-23 |
20150206054 | RULE MANAGEMENT DEVICE, RULE MANAGEMENT METHOD, AND PROGRAM - A rule management device includes: a display unit which displays a plurality of condition objects that respectively indicate a plurality of conditions on a screen; an input receiving unit which receives an input for grouping the plurality of condition objects on the screen; and a rule registration unit which performs processing, for each of the group, for, when the group includes the plurality of condition objects, generating a rule that links a predetermined conclusion to a first condition in which all the plurality of conditions that are identified by the plurality of condition objects are combined by ANDs and registering the rule, and, when the group includes only one of the condition objects, generating a rule that links a predetermined conclusion to one of the conditions that is identified by the one of the condition objects and registering the rule. | 2015-07-23 |